Government agencies and public organizations often consider adopting open source software (OSS) for reasons of transparency, cost, citizen access, and greater efficiency in communication and ...
More

Government agencies and public organizations often consider adopting open source software (OSS) for reasons of transparency, cost, citizen access, and greater efficiency in communication and delivering services. This book offers five real-world case studies of OSS adoption by public organizations. The authors analyze the cases and develop an overarching, conceptual framework to clarify the various enablers and inhibitors of OSS adoption in the public sector. The book provides a resource for policymakers, practitioners, and academics. The five cases of OSS adoption include a hospital in Ireland; an IT consortium serving all the municipalities of the province of Bozen-Bolzano, Italy; schools and public offices in the Extremadura region of Spain; the Massachusetts state government's open standards policy in the United States; and the ICT department of the Italian Chamber of Deputies. The book provides a comparative analysis of these cases around the issues of motivation, strategies, technologies, economic and social aspects, and the implications for theory and practice.Less

Adopting Open Source Software : A Practical Guide

Brian FitzgeraldJay P. KesanBarbara RussoMaha ShaikhGiancarlo Succi

Published in print: 2011-10-14

Government agencies and public organizations often consider adopting open source software (OSS) for reasons of transparency, cost, citizen access, and greater efficiency in communication and delivering services. This book offers five real-world case studies of OSS adoption by public organizations. The authors analyze the cases and develop an overarching, conceptual framework to clarify the various enablers and inhibitors of OSS adoption in the public sector. The book provides a resource for policymakers, practitioners, and academics. The five cases of OSS adoption include a hospital in Ireland; an IT consortium serving all the municipalities of the province of Bozen-Bolzano, Italy; schools and public offices in the Extremadura region of Spain; the Massachusetts state government's open standards policy in the United States; and the ICT department of the Italian Chamber of Deputies. The book provides a comparative analysis of these cases around the issues of motivation, strategies, technologies, economic and social aspects, and the implications for theory and practice.

In this book, the world's foremost cyber security experts share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ...
More

In this book, the world's foremost cyber security experts share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ourselves from attack and exploitation. It collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries. It provides readers with the information they need to secure and sustain the cyberspace ecosystem and to defend themselves against all kinds of adversaries and attacks. It provides critical intelligence on cyber crime and security—including details of real-life operations. Among the many important topics it covers are: building a secure cyberspace ecosystem; public-private partnerships to secure cyberspace; law enforcement to protect cyber citizens and to safeguard cyber infrastructure; and strategy and policy issues relating to the security of the cyberecosystem.Less

Advances in Cyber Security : Technology, Operations, and Experiences

Published in print: 2013-04-03

In this book, the world's foremost cyber security experts share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ourselves from attack and exploitation. It collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries. It provides readers with the information they need to secure and sustain the cyberspace ecosystem and to defend themselves against all kinds of adversaries and attacks. It provides critical intelligence on cyber crime and security—including details of real-life operations. Among the many important topics it covers are: building a secure cyberspace ecosystem; public-private partnerships to secure cyberspace; law enforcement to protect cyber citizens and to safeguard cyber infrastructure; and strategy and policy issues relating to the security of the cyberecosystem.

This volume not only examines traditional questions about broadband, such as availability and access, but also explores and evaluates new metrics that are more applicable to the evolving technologies ...
More

This volume not only examines traditional questions about broadband, such as availability and access, but also explores and evaluates new metrics that are more applicable to the evolving technologies of information access. It brings together a group of media policy scholars from a wide range of disciplines including economics, law, policy studies, computer science, information science, and communications studies. It asks questions such as: After broadband access, what next? What role do metrics play in understanding information societies and, more important, in shaping their policies? Beyond counting people with broadband access, how can economic and social metrics inform broadband policies, help evaluate their outcomes, and create useful models for achieving national goals? Importantly, the book provides a well-rounded, international perspective on theoretical approaches to communications policymaking in the Americas, Europe, Asia, and Africa. Showcasing a diversity of approaches, this collection aims to help meet the myriad challenges involved in improving the development of communications policy around the world.Less

Published in print: 2013-06-03

This volume not only examines traditional questions about broadband, such as availability and access, but also explores and evaluates new metrics that are more applicable to the evolving technologies of information access. It brings together a group of media policy scholars from a wide range of disciplines including economics, law, policy studies, computer science, information science, and communications studies. It asks questions such as: After broadband access, what next? What role do metrics play in understanding information societies and, more important, in shaping their policies? Beyond counting people with broadband access, how can economic and social metrics inform broadband policies, help evaluate their outcomes, and create useful models for achieving national goals? Importantly, the book provides a well-rounded, international perspective on theoretical approaches to communications policymaking in the Americas, Europe, Asia, and Africa. Showcasing a diversity of approaches, this collection aims to help meet the myriad challenges involved in improving the development of communications policy around the world.

The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at ...
More

The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. This book examines the challenge of defining a new evidentiary framework for electronic documents, focusing on the design of a digital equivalent to handwritten signatures. From the blackboards of mathematicians to the halls of legislative assemblies, the book traces the path of such an equivalent: digital signatures based on the mathematics of public-key cryptography. In the mid-1990s, cryptographic signatures formed the centerpiece of a worldwide wave of legal reform and of an ambitious cryptographic research agenda that sought to build privacy, anonymity, and accountability into the very infrastructure of the Internet. Yet markets for cryptographic products collapsed in the aftermath of the dot-com boom and bust along with cryptography’s social projects. The book describes the trials of French bureaucracies as they wrestled with the application of electronic signatures to real estate contracts, birth certificates, and land titles, and tracks the convoluted paths through which electronic documents acquire moral authority. These paths suggest that the material world need not merely succumb to the virtual but, rather, can usefully inspire it. Indeed, the book argues, in renewing their engagement with the material world, cryptographers might also find the key to broader acceptance of their design goals.Less

Burdens of Proof : Cryptographic Culture and Evidence Law in the Age of Electronic Documents

Jean-Francois Blanchette

Published in print: 2012-04-27

The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. This book examines the challenge of defining a new evidentiary framework for electronic documents, focusing on the design of a digital equivalent to handwritten signatures. From the blackboards of mathematicians to the halls of legislative assemblies, the book traces the path of such an equivalent: digital signatures based on the mathematics of public-key cryptography. In the mid-1990s, cryptographic signatures formed the centerpiece of a worldwide wave of legal reform and of an ambitious cryptographic research agenda that sought to build privacy, anonymity, and accountability into the very infrastructure of the Internet. Yet markets for cryptographic products collapsed in the aftermath of the dot-com boom and bust along with cryptography’s social projects. The book describes the trials of French bureaucracies as they wrestled with the application of electronic signatures to real estate contracts, birth certificates, and land titles, and tracks the convoluted paths through which electronic documents acquire moral authority. These paths suggest that the material world need not merely succumb to the virtual but, rather, can usefully inspire it. Indeed, the book argues, in renewing their engagement with the material world, cryptographers might also find the key to broader acceptance of their design goals.

This is a book about the computer revolution of the mid-twentieth century and the people who made it possible. Unlike most histories of computing, it is not a book about machines, inventors, or ...
More

This is a book about the computer revolution of the mid-twentieth century and the people who made it possible. Unlike most histories of computing, it is not a book about machines, inventors, or entrepreneurs. Instead, the book tells the story of the vast but largely anonymous legions of computer specialists—programmers, systems analysts, and other software developers—who transformed the electronic computer from a scientific curiosity into the defining technology of the modern era. As the systems that they built became increasingly powerful and ubiquitous, these specialists became the focus of a series of critiques of the social and organizational impact of electronic computing. To many of their contemporaries, it seemed the “computer boys” were taking over, not just in the corporate setting, but also in government, politics, and society in general. This book traces the rise to power of the computer expert in modern American society. Its portrayal of the men and women (a surprising number of the “computer boys” were, in fact, female) who built their careers around the novel technology of electronic computing explores issues of power, identity and expertise that have only become more significant in our increasingly computerized society. In a recasting of the drama of the computer revolution through the eyes of its principle revolutionaries, the book reminds us that the computerization of modern society was not an inevitable process driven by impersonal technological or economic imperatives, but was rather a creative, contentious, and above all, fundamentally human development.Less

The Computer Boys Take Over : Computers, Programmers, and the Politics of Technical Expertise

Nathan L. Ensmenger

Published in print: 2010-08-13

This is a book about the computer revolution of the mid-twentieth century and the people who made it possible. Unlike most histories of computing, it is not a book about machines, inventors, or entrepreneurs. Instead, the book tells the story of the vast but largely anonymous legions of computer specialists—programmers, systems analysts, and other software developers—who transformed the electronic computer from a scientific curiosity into the defining technology of the modern era. As the systems that they built became increasingly powerful and ubiquitous, these specialists became the focus of a series of critiques of the social and organizational impact of electronic computing. To many of their contemporaries, it seemed the “computer boys” were taking over, not just in the corporate setting, but also in government, politics, and society in general. This book traces the rise to power of the computer expert in modern American society. Its portrayal of the men and women (a surprising number of the “computer boys” were, in fact, female) who built their careers around the novel technology of electronic computing explores issues of power, identity and expertise that have only become more significant in our increasingly computerized society. In a recasting of the drama of the computer revolution through the eyes of its principle revolutionaries, the book reminds us that the computerization of modern society was not an inevitable process driven by impersonal technological or economic imperatives, but was rather a creative, contentious, and above all, fundamentally human development.

Human information interaction (HII) is an emerging area of study that investigates how people interact with information; its subfield human information behavior (HIB) is a flourishing, active ...
More

Human information interaction (HII) is an emerging area of study that investigates how people interact with information; its subfield human information behavior (HIB) is a flourishing, active discipline. Yet despite their obvious relevance to the design of information systems, these research areas have had almost no impact on systems design. One issue may be the contextual complexity of human interaction with information; another may be the difficulty in translating real-life and unstructured HII complexity into formal, linear structures necessary for systems design. This book proposes a research approach that bridges the study of human information interaction and the design of information systems: cognitive work analysis (CWA). Developed by Jens Rasmussen and his colleagues, CWA embraces complexity and provides a conceptual framework and analytical tools that can harness it to create design requirements. It offers an ecological approach to design, analyzing the forces in the environment that shape human interaction with information. The book reviews research in HIB, focusing on its contribution to systems design, and then presents the CWA framework. It shows that CWA, with its ecological approach, can be used to overcome design challenges and lead to the development of effective systems. Researchers and designers who use CWA can increase the diversity of their analytical tools, providing them with an alternative approach when they plan research and design projects. The CWA framework enables a collaboration between design and HII that can create information systems tailored to fit human lives.Less

Raya Fidel

Published in print: 2012-03-23

Human information interaction (HII) is an emerging area of study that investigates how people interact with information; its subfield human information behavior (HIB) is a flourishing, active discipline. Yet despite their obvious relevance to the design of information systems, these research areas have had almost no impact on systems design. One issue may be the contextual complexity of human interaction with information; another may be the difficulty in translating real-life and unstructured HII complexity into formal, linear structures necessary for systems design. This book proposes a research approach that bridges the study of human information interaction and the design of information systems: cognitive work analysis (CWA). Developed by Jens Rasmussen and his colleagues, CWA embraces complexity and provides a conceptual framework and analytical tools that can harness it to create design requirements. It offers an ecological approach to design, analyzing the forces in the environment that shape human interaction with information. The book reviews research in HIB, focusing on its contribution to systems design, and then presents the CWA framework. It shows that CWA, with its ecological approach, can be used to overcome design challenges and lead to the development of effective systems. Researchers and designers who use CWA can increase the diversity of their analytical tools, providing them with an alternative approach when they plan research and design projects. The CWA framework enables a collaboration between design and HII that can create information systems tailored to fit human lives.

Information retrieval in the age of Internet search engines has become part of ordinary discourse and everyday practice: “Google” is a verb in common usage. Thus far, more attention has been given to ...
More

Information retrieval in the age of Internet search engines has become part of ordinary discourse and everyday practice: “Google” is a verb in common usage. Thus far, more attention has been given to practical understanding of information retrieval than to a full theoretical account. This book offers a comprehensive overview of information retrieval, synthesizing theories from different disciplines (information and computer science, librarianship and indexing, and information society discourse) and incorporating such disparate systems as WorldCat and Google into a single theoretical framework. There is a need for such a theoretical treatment, it argues, one that reveals the structure and underlying patterns of this complex field while remaining congruent with everyday practice. The book presents a labor theoretic approach to information retrieval, building on previously formulated distinction between semantic and syntactic mental labor, arguing that the description and search labor of information retrieval can be understood as both semantic and syntactic in character. This information science approach is rooted in the humanities and the social sciences but informed by an understanding of information technology and information theory. The chapters offer a progressive exposition of the topic, with illustrative examples to explain the concepts presented.Less

Human Information Retrieval

Julian Warner

Published in print: 2009-09-25

Information retrieval in the age of Internet search engines has become part of ordinary discourse and everyday practice: “Google” is a verb in common usage. Thus far, more attention has been given to practical understanding of information retrieval than to a full theoretical account. This book offers a comprehensive overview of information retrieval, synthesizing theories from different disciplines (information and computer science, librarianship and indexing, and information society discourse) and incorporating such disparate systems as WorldCat and Google into a single theoretical framework. There is a need for such a theoretical treatment, it argues, one that reveals the structure and underlying patterns of this complex field while remaining congruent with everyday practice. The book presents a labor theoretic approach to information retrieval, building on previously formulated distinction between semantic and syntactic mental labor, arguing that the description and search labor of information retrieval can be understood as both semantic and syntactic in character. This information science approach is rooted in the humanities and the social sciences but informed by an understanding of information technology and information theory. The chapters offer a progressive exposition of the topic, with illustrative examples to explain the concepts presented.

We live in an interoperable world. Computer hardware and software products from different manufacturers can exchange data within local networks and around the world using the Internet. The ...
More

We live in an interoperable world. Computer hardware and software products from different manufacturers can exchange data within local networks and around the world using the Internet. The competition enabled by this compatibility between devices has led to fast-paced innovation and prices low enough to allow ordinary users to command extraordinary computing capacity. This book investigates an often overlooked factor in the development of today’s interoperabilty: the evolution of copyright law. Because software is copyrightable, copyright law determines the rules for competition in the information technology industry. The book examines the debates surrounding the use of copyright law to prevent competition and interoperability in the global software industry in the last fifteen years. The chapters present a reasoned view of contentious issues related to interoperability issues in the United States, the European Union, and the Pacific Rim. They discuss such topics as the protectability of interface specifications, the permissibility of reverse engineering (and legislative and executive endorsement of pro-interoperability case law), the interoperability exception to the U.S. Digital Millennium Copyright Act and the interoperability cases decided under it, the enforceability of contractural restrictions on reverse engineering, and recent legal developments affecting the future of interoperability, including those related to open source-software and software patents.Less

Interfaces on Trial 2.0

Jonathan BandMasanobu Katoh

Published in print: 2011-03-04

We live in an interoperable world. Computer hardware and software products from different manufacturers can exchange data within local networks and around the world using the Internet. The competition enabled by this compatibility between devices has led to fast-paced innovation and prices low enough to allow ordinary users to command extraordinary computing capacity. This book investigates an often overlooked factor in the development of today’s interoperabilty: the evolution of copyright law. Because software is copyrightable, copyright law determines the rules for competition in the information technology industry. The book examines the debates surrounding the use of copyright law to prevent competition and interoperability in the global software industry in the last fifteen years. The chapters present a reasoned view of contentious issues related to interoperability issues in the United States, the European Union, and the Pacific Rim. They discuss such topics as the protectability of interface specifications, the permissibility of reverse engineering (and legislative and executive endorsement of pro-interoperability case law), the interoperability exception to the U.S. Digital Millennium Copyright Act and the interoperability cases decided under it, the enforceability of contractural restrictions on reverse engineering, and recent legal developments affecting the future of interoperability, including those related to open source-software and software patents.

The use of open-source software (OSS)—readable software source code that can be copied, modified, and distributed freely—has expanded dramatically in recent years. The number of OSS projects hosted ...
More

The use of open-source software (OSS)—readable software source code that can be copied, modified, and distributed freely—has expanded dramatically in recent years. The number of OSS projects hosted on SourceForge.net (the largest hosting Web site for OSS), for example, grew from just over 100,000 in 2006 to more than 250,000 at the beginning of 2011. But why are some projects successful—that is, able to produce usable software and sustain ongoing development over time—while others are abandoned? This book, the product of a large-scale empirical study to look at social, technical, and institutional aspects of OSS, examines factors that lead to success in OSS projects and work toward a better understanding of Internet-based collaboration. Drawing on literature from many disciplines and using a theoretical framework developed for the study of environmental commons, it examines stages of OSS development, presenting multivariate statistical models of success and abandonment. The authors argue that analyzing the conditions of OSS successes may also inform Internet collaborations in fields beyond software engineering, particularly those which aim to solve complex technical, social, and political problems.Less

Internet Success : A Study of Open-Source Software Commons

Charles M. SchweikRobert C. English

Published in print: 2012-06-08

The use of open-source software (OSS)—readable software source code that can be copied, modified, and distributed freely—has expanded dramatically in recent years. The number of OSS projects hosted on SourceForge.net (the largest hosting Web site for OSS), for example, grew from just over 100,000 in 2006 to more than 250,000 at the beginning of 2011. But why are some projects successful—that is, able to produce usable software and sustain ongoing development over time—while others are abandoned? This book, the product of a large-scale empirical study to look at social, technical, and institutional aspects of OSS, examines factors that lead to success in OSS projects and work toward a better understanding of Internet-based collaboration. Drawing on literature from many disciplines and using a theoretical framework developed for the study of environmental commons, it examines stages of OSS development, presenting multivariate statistical models of success and abandonment. The authors argue that analyzing the conditions of OSS successes may also inform Internet collaborations in fields beyond software engineering, particularly those which aim to solve complex technical, social, and political problems.

This is a book about obfuscation: the production of noise modeled on an existing signal in order to make a collection of data more ambiguous, confusing, harder to exploit, more difficult to act on, ...
More

This is a book about obfuscation: the production of noise modeled on an existing signal in order to make a collection of data more ambiguous, confusing, harder to exploit, more difficult to act on, and therefore less valuable. It is a tool for defending and expanding digital privacy against data surveillance, and protesting the unjust collection or misuse of data. The authors provide strategies and an argument for evasion, noncompliance, refusal, even sabotage, particularly for average users not in a position to opt out or exert control over data about themselves. Obfuscation also has applications for groups -- from software developers to policymakers -- who want to collect and apply data without the possibility of its future misuse. The book offers many examples, case histories, and arguments about the nature, function, and promise of obfuscation: why it is necessary, whether it is justified, how it works, and how it can be integrated with other privacy practices and technologies.Less

Obfuscation : A User's Guide for Privacy and Protest

Finn BruntonHelen Nissenbaum

Published in print: 2015-09-30

This is a book about obfuscation: the production of noise modeled on an existing signal in order to make a collection of data more ambiguous, confusing, harder to exploit, more difficult to act on, and therefore less valuable. It is a tool for defending and expanding digital privacy against data surveillance, and protesting the unjust collection or misuse of data. The authors provide strategies and an argument for evasion, noncompliance, refusal, even sabotage, particularly for average users not in a position to opt out or exert control over data about themselves. Obfuscation also has applications for groups -- from software developers to policymakers -- who want to collect and apply data without the possibility of its future misuse. The book offers many examples, case histories, and arguments about the nature, function, and promise of obfuscation: why it is necessary, whether it is justified, how it works, and how it can be integrated with other privacy practices and technologies.